queries, so a careful consideration of the mix of
queries is important.
Overall computational resource requirements are
increased due to the need for encryption, extra logic,
and processing, with an overall increase of a small
factor over the unencrypted computing resources.
This factor may vary depending on the particular
application and mix of queries.
Performance with multiple users showed good
scalability, with no observable encryption-related
latency.
Using CryptDB with an encrypted database is
feasible for moving a sensitive database to an
untrusted cloud hosting environment. The latency
performance is comparable to the use of an
unencrypted database, and comparable throughput
can be achieved with additional resources to support
the encryption-related computation.
6 FUTURE WORK
Follow-on work to this study includes testing on an
operational Oracle ERP system under normal use
cases and workflows.
Additional extensions and improvements are
planned for CryptDB, and PL/SQL support is to be
expanded. Performance improvement for Paillier
encryption may be possible using GPUs, which
should improve performance and reduce the load on
the CPU. This will provide the benefits of improved
scalability for Paillier encryption and reduced CPU
contention for other queries.
It was noted earlier that there are possible
leakages of information about plaintext through
some of the encryption schemes. For example,
relative sizes and distributions of numbers can be
calculated for OPE encryption, which could lead to a
few known values revealing other encrypted values.
This leakage cannot be completely eliminated,
but it can be reduced by various methods. First,
additional entries can be added to the database to
smooth out the distribution of values. Additional
queries would be inserted periodically to access
these otherwise unused values. Second, existing
entries with the same values can be split into
different categories by CryptDB so that they appear
different in the database. Third, encryption keys can
be changed periodically. These all impose a resource
burden on the system through additional storage and
computation.
ACKNOWLEDGEMENTS
The authors wish to acknowledge Virgil Gligor for
his deep insights and broad knowledge in
homomorphic encryption and related areas.
REFERENCES
Acar, A., Aksu, H., Uluagac, A. S., and Conti, M. A.
Survey on Homomorphic Encryption Schemes:
Theory and Implementation. arXiv preprint
arXiv:1704.03578v1, April 12, 2017.
Akin, I. H., and Berk, S. 2015. “On the Difficulty of
Securing Web Applications using CryptDB,”
International Association for Cryptologic Research.
Available at https://eprint.iacr.org/2015/082.
Foltz, K. and Simpson, W. Enterprise Level Security with
Homomorphic Encryption. In Proceedings of 19
th
International Conference on Enterprise Information
Systems (ICEIS 2017), Porto, Portugal, April 26–29,
2017.
Gentry, C. 2009. “A Fully Homomorphic Encryption
Scheme.” Doctoral thesis. Stanford University.
Available at https://crypto.stanford.edu/craig/craig-
thesis.pdf.
Gligor, V. 2014. “Homomorphic Computations in Secure
System Design,” Final Report. Pittsburgh, PA:
Carnegie Mellon University.
Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., and Wong, D.
S. “L-encdb: A lightweight framework for privacy-
preserving data queries in cloud computing,” Knowl.-
Based Syst., vol. 79, pp. 18–26, 2015.
Macedo, R. et al., “A Practical Framework for Privacy-
Preserving NoSQL Databases,” 2017 IEEE 36th
Symposium on Reliable Distributed Systems (SRDS),
Hong Kong, 2017, pp. 11–20.
Naveed, M., Kamara, S., and Wright, C. V. “Inference
Attacks on Property-Preserving Encrypted Databases.”
In: CCS’15, Denver, CO, 2015.
Pattuk, E., Kantarcioglu, M., Khadilkar, V., Ulusoy, H.,
and Mehrotra, S. “Bigsecret: A secure data
management framework for key-value stores,”
International Conference on Cloud Computing, 2013.
Popa, R. A., Redfield, C. M.S., Zeldovich, N., and
Balakrishnan, H. 2012 “CryptDB: Processing Queries
on an Encrypted Database,” Comm. ACM, vol. 55, no
9, Sept. 2012 (also Proc. of 23rd ACM SoSP, Sept.
2011).
Tu, S., Kaashoek, M. F., Madden, S., and Zeldovich, N.
“Processing analytical queries over encrypted data,”
Proc. VLDB Endow., 2013.